4
Introduction, Purpose and Objectives BioSec is a wireless biometric security system that Keeps all of the clients biometrics on the primary device (you dont have to give your boss your fingerprints) Makes sure the client is alive before allowing access Can be attached to nearly any electrical device to enhance security Could be used as an interface for securely transmitting vital signs

11
Pulse Oximetry Pulse and blood oxygenation are measured by shining a beam of light from an LED through a tissue bed (typically, the finger) Extremely common for use on patients under anesthesia during surgery We will use Pulse Oximetry to verify that the client being authenticated is alive

17
Secondary Device Receives signal from primary device and activates the controlled device Uses a switch to enable/disable power to the controlled device Sends signals if necessary to activate the controlled device

18
Communication between Primary and Secondary Devices We use Bluetooth as our primary communication device between Primary and Secondary Devices: More suitable for PAN (Personal Area Network) Eg: To connect PDAs, Notebooks, Printers, Digital camera, cell phones with each other or a computer. Range: 30 – 60 ft High powered Bluetooth up to 300 ft Operating frequency: 2.45 GHZ Data rate: 720 Kbps Capability of transmitting voice, data, video and still images Less interference to adjacent users Sends very weak signals of 1mw Uses Frequency Hopping at 1.6 MHZ Data packets are small

19
Why Bluetooth? Infra Red Not suitable because of Line of sight Wi Fi More suitable for LANs than PANs Bluetooth Security: Extremely secure Uses several layers of data encryption and user authentication Uses PIN and a Bluetooth address to identify other Bluetooth devices

23
Labor and Responsibilities Mat Merkows primary responsibilities will include writing the finite state machines running on the FPGAs, building the secondary device, writing drivers and interfaces to the other components and writing documentation. Tung Nguyens primary responsibilities will include implementing the Authentication module, creating the user interface and writing documentation. Dipesh Shakyas primary responsibilities will include setting up communication between the two devices, software development and writing documentation.

24
Risks & Contingency Plan Not able to spend 1000$ for a Fingerprint Module Develop an authentication algorithm / software Difficulty in contact with biometric companies for technical supports Evaluate technical support availability before placing an order Number of members vs. the whole project possible cut back in complexity Inexperience of Interfaces Between Hardware Components Do more research ahead of time Complex Software User Interface Spend more time learning